50 research outputs found

    Children struggle beyond preschool-age in a continuous version of the ambiguous figures task

    Get PDF
    Children until the age of five are only able to reverse an ambiguous figure when they are informed about the second interpretation. In two experiments, we examined whether children’s difficulties would extend to a continuous version of the ambiguous figures task. Children (Experiment 1: 66 3- to 5-year olds; Experiment 2: 54 4- to 9-year olds) and adult controls saw line drawings of animals gradually morph—through well-known ambiguous figures—into other animals. Results show a relatively late developing ability to recognize the target animal, with difficulties extending beyond preschool-age. This delay can neither be explained with improvements in theory of mind, inhibitory control, nor individual differences in eye movements. Even the best achieving children only started to approach adult level performance at the age of 9, suggesting a fundamentally different processing style in children and adults

    Side channel analysis of the SHA-3 finalists

    No full text
    At the cutting edge of today's security research and development, the SHA-3 competition evaluates a new secure hashing standard in succession to SHA-2. The five remaining candidates of the SHA-3 competition are BLAKE, Grøstl, JH, Keccak, and Skein. While the main focus was on the algorithmic security of the candidates, a side channel analysis has only been performed for BLAKE and Grøstl [1]. In order to equally evaluate all candidates, we identify side channel attacks on JH-MAC, Keccak-MAC, and Skein-MAC and demonstrate the applicability of the attacks by attacking their respective reference implementation. Additionally, we revisit the side channel analysis of Grøstl and introduce a profiling based side channel attack, which emphasizes the importance of side channel resistant hash functions by recovering the input to the hash function using only the measured power consumption

    How a symmetry metric assists side-channel evaluation: A novel model verification method for power analysis

    No full text
    Side-channel analysis has become an important field of research for the semiconductor industry and for the academic sector as well. Of particular interest is constructive side-channel analysis as it supports a target-oriented associated design process. The main goal is to increase the side-channel resistance of cryptographic implementations within the design phase by a combination of advanced stochastic methods with design methods, tools, and countermeasures. In this contribution we present a new enhanced tool that utilizes symmetry properties to assist the side-channel evaluation of cryptographic implementations. This technique applies a symmetry metric, which is introduced as an engineering tool to verify the suitability of the leakage model in the evaluation phase of security-sensitive designs. Additionally, this approach also supports the designer in the selection of appropriate time instants

    Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks

    Get PDF
    Contains fulltext : 225755.pdf (preprint version ) (Open Access)FDTC 202

    Secure Boot Revisited

    No full text
    Secure boot, although known for more than 20 years, frequent attacks from hackers shows numerous ways to bypass the security mechanism, including ECUs of the automotive industry. This paper investigates the major causes for security weaknesses of secure boot implementations. Based on penetration test experiences, we start from an attacker perspective to identify and outline common implementation weaknesses. Then, from a Tier-One perspective, we analyze challenges in the research and development process of ECUs between OEMs and suppliers which amplify the probability of such weakness. The paper provides recommendations to increase the understanding of implementing secure boot securely on both sides and derives a set of reference requirements as starting point for secure boot ECU requirements
    corecore